Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 19:53
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
lumma
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 4144 msedge.exe 4144 msedge.exe 3308 identity_helper.exe 3308 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4492 4144 msedge.exe 83 PID 4144 wrote to memory of 4492 4144 msedge.exe 83 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3728 4144 msedge.exe 84 PID 4144 wrote to memory of 3108 4144 msedge.exe 85 PID 4144 wrote to memory of 3108 4144 msedge.exe 85 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86 PID 4144 wrote to memory of 1140 4144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://toppyneedus.biz/api1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc45246f8,0x7ffdc4524708,0x7ffdc45247182⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16571775359337538217,1703248084816512643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
542B
MD588cceb06c2968cb55883b2d91a5715f7
SHA150407234066a7dbb71b50c59e838aa91af998509
SHA2562e69f298cce2ea7118821d3cc1d72c07c410905e352242ee59a5f4d4ccfd65e3
SHA512cd4471fb5c2cb2a85785ed82503494480be55f810171688e675a476ef68106ce44bc87a74c9502591f634baf9b5925f41d8b9d7d00dcc7f89b1400eef6f257f7
-
Filesize
6KB
MD579f9991d184c043b36347f274b7e3e57
SHA1e1d45de363e29fd7d6bfecf753f5a322fbdde9b1
SHA256d899e01b1e075a50f8bd2684aa0a4894d2cb744578a0467e6cc92ff595602b58
SHA51279adad2494cd15c24a640d26d6afa1d611820514676242bd2f1ad0675b6e7b0e38947aa78218e948843fbe3699b64e9f00594c0f8d40b3ebb2e963935b4eda5c
-
Filesize
5KB
MD5a2932d2c9c9aa67163bf378f9bd25959
SHA12a715e1b3004d2e153320d0bf27f27d3befb0a2b
SHA25601ba2c3181776b0d805b2882677c64c5b7d53141374ba74595230ce2cdcfe20a
SHA512c642cfcf5c968a863562a1814889cb6a181a49fb74a6a613451baa0e26da8ab3117c88f73cc458a33c385c0dc2d2317eb71f468bb62e41bbfce8b8e43112917a
-
Filesize
6KB
MD51667ebd036eae1876bdd25618473b350
SHA182f39719c90811d0f973ba48148781a58f8c92e2
SHA256b218659d2036a40a1d7f14de92cc51ed31a18bde5fb4271374ca40cd97d7ad52
SHA51233ca857aca6c5b432df0b9751910e55e5710f21c5a578f09d7998c0ab0ec520d0061d6ac1655637a871965a05f348bf1d9deb08e1d46af8cf9b7564826fbc866
-
Filesize
6KB
MD58135429e1f1932b8105cb344b7c372ea
SHA100e043ae319085a4d34ce15aa603b8f51acc062b
SHA2568e48c3c3bcfa6ea09a3c8eea96700f7125b9301705a64c05e71887498e65eaa1
SHA512c47d7595fe5207a39038a4123b35c2ba96db6a0e53d6f78703e85166deae08b8c54a715ef841722e78f4223da676f3e52fd606b5e9cb50e2c8bc0ece343f964d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538b5517047b32b2d2c98b69014b9d1de
SHA1e09d3a5751c440691cd1752722ba00b3c0be343e
SHA25619fa79cb46b6138708106a086955cbf8cc77555cc41533ba3c21089f695b9ac1
SHA512f64499cdd51784031cc16a47b91224ab0956646fa9da8274844752434b647fbf75a6fb0e92b608dc847adb0b542a5d8c1f354949e92fa9580c6adf34aa7ed142
-
Filesize
10KB
MD555c69f59bf2779f70d7d515e2ee3eaad
SHA1f6bd1f735fca40f9ac5e2ce0b1276ea0ace3d4b3
SHA25695835f4c12672e1c7fee87043344a4c185da29e9d323560b3172d1530f339e7a
SHA512b53cc283fd5641ae1ad619d6aa97a1dcfc19a8fe9e4b6834556e64789a545ed4364f8d32fdd903471c7de57744ca540ad055be83eb6521e0831a8a8241275bc6